{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:26:57Z","timestamp":1773512817157,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":68,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642351693","type":"print"},{"value":"9783642351709","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35170-9_6","type":"book-chapter","created":{"date-parts":[[2012,11,10]],"date-time":"2012-11-10T02:37:05Z","timestamp":1352515025000},"page":"101-120","source":"Crossref","is-referenced-by-count":130,"title":["SPADE: Support for Provenance Auditing in Distributed Environments"],"prefix":"10.1007","author":[{"given":"Ashish","family":"Gehani","sequence":"first","affiliation":[]},{"given":"Dawood","family":"Tariq","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Abraham, J., Brazier, P., Chebotko, A., Navarro, J., Piazza, A.: Distributed storage and querying techniques for a semantic Web of scientific workflow provenance. In: IEEE International Conference on Services Computing (2010)","DOI":"10.1109\/SCC.2010.14"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/11508380_46","volume-title":"Advances in Grid Computing - EGC 2005","author":"M. Nedim Alpdemir","year":"2005","unstructured":"Nedim Alpdemir, M., Mukherjee, A., Paton, N.W., Fernandes, A.A.A., Watson, P., Glover, K., Greenhalgh, C., Oinn, T., Tipney, H.: Contextualised Workflow Execution in MyGrid. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol.\u00a03470, pp. 444\u2013453. Springer, Heidelberg (2005)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Altschul, S.F., Madden, T.L., Schaffer, A.A., Zhang, J., Zhang, Z., Miller, W., Lipman, D.J.: Gapped BLAST and PSI-BLAST: A new generation of protein database search programs. Nucleic Acids Research\u00a025 (1997)","DOI":"10.1093\/nar\/25.17.3389"},{"key":"6_CR4","unstructured":"Apache Web Server (Version 2.2.22), \n                    \n                      http:\/\/httpd.apache.org\/"},{"key":"6_CR5","unstructured":"BaBar, \n                    \n                      http:\/\/www-public.slac.stanford.edu\/babar\/"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Bhagwat, D., Chiticariu, L., Tan, W.-C., Vijayvargiya, G.: An annotation management system for relational databases. In: 30th ACM International Conference on Very Large Data Bases (2004)","DOI":"10.1016\/B978-012088469-8\/50079-6"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Bose, R., Frew, J.: Lineage retrieval for scientific data processing: A survey. ACM Computing Surveys\u00a037(1) (2005)","DOI":"10.1145\/1057977.1057978"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Callahan, S., Freire, J., Santos, E., Scheidegger, C., Silva, C., Vo, H.: VisTrails: Visualization meets data management. In: ACM SIGMOD International Conference on Management of Data (2006)","DOI":"10.1145\/1142473.1142574"},{"key":"6_CR9","unstructured":"Chang, F., Dean, J., Ghemawat, S., Hsieh, W., Wallach, D., Burrows, M., Chandra, T., Fikes, A., Gruber, R.: BigTable: A distributed storage system for structured data. 7th USENIX Symposium on Operating Systems Design and Implementation (2006)"},{"key":"6_CR10","unstructured":"Event Tracing for Windows, \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/library\/bb968803.aspx"},{"key":"6_CR11","unstructured":"Foster, I.T., Vckler, J.-S., Wilde, M., Zhao, Y.: A virtual data system for representing, querying, and automating data derivation. In: Scientific and Statistical Database Management Conference (2002)"},{"key":"6_CR12","unstructured":"Frew, J., Bose, R.: Earth System Science Workbench: A data management infrastructure for earth science products. In: Scientific and Statistical Database Management Conference (2001)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Frew, J., Metzger, D., Slaughter, P.: Automatic capture and reconstruction of computational provenance. Concurrency and Computation\u00a020(5) (2008)","DOI":"10.1002\/cpe.1247"},{"key":"6_CR14","unstructured":"Filesystem in Userspace, \n                    \n                      http:\/\/fuse.sourceforge.net"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Gehani, A., Lindqvist, U.: Bonsai: Balanced lineage authentication. In: 23rd Annual Computer Security Applications Conference. IEEE Computer Society (2007)","DOI":"10.1109\/ACSAC.2007.45"},{"key":"6_CR16","unstructured":"Gehani, A., Kim, M., Zhang, J.: Steps toward managing lineage metadata in Grid clusters. In: 1st Workshop on the Theory and Practice of Provenance (2009)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Gehani, A., Kim, M., Malik, T.: Efficient querying of distributed provenance stores. In: 8th ACM Workshop on the Challenges of Large Applications in Distributed Environments (2010)","DOI":"10.1145\/1851476.1851567"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Gehani, A., Kim, M.: Mendel: Efficiently verifying the lineage of data modified in multiple trust domains. In: 19th ACM International Symposium on High Performance Distributed Computing (2010)","DOI":"10.1145\/1851476.1851503"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Gehani, A., Tariq, D., Baig, B., Malik, T.: Policy-based integration of provenance metadata. In: 12th IEEE International Symposium on Policies for Distributed Systems and Networks (2011)","DOI":"10.1109\/POLICY.2011.12"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Glavic, B., Alonso, G.: Perm: Processing provenance and data on the same data model through query rewriting. In: 25th International Conference on Data Engineering (2009)","DOI":"10.1109\/ICDE.2009.15"},{"key":"6_CR21","unstructured":"Graphviz, \n                    \n                      http:\/\/www.graphviz.org\/"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Green, T., Karvounarakis, G., Tannen, V.: Provenance semirings. In: 26th ACM Symposium on Principles of Database Systems (2007)","DOI":"10.1145\/1265530.1265535"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Groth, P., Moreau, L.: Representing distributed systems using the Open Provenance Model. Future Generation Computer Systems\u00a027(6) (2011)","DOI":"10.1016\/j.future.2010.10.001"},{"key":"6_CR24","unstructured":"Heydon, A., Levin, R., Mann, T., Yu, Y.: The Vesta Approach to Software Configuration Management. Technical Report 168, Compaq Systems Research Center (2001)"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Heinis, T., Alonso, G.: Efficient lineage tracking for scientific workflows. In: ACM SIGMOD International Conference on Management of Data (2008)","DOI":"10.1145\/1376616.1376716"},{"key":"6_CR26","unstructured":"Holland, D.A., Braun, U., Maclean, D., Muniswamy-Reddy, K., Seltzer, M.: Choosing a data model and query language for provenance. In: 2nd International Provenance and Annotation Workshop (2008)"},{"key":"6_CR27","unstructured":"H2, \n                    \n                      http:\/\/www.h2database.com"},{"key":"6_CR28","unstructured":"Installable File System, \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/windows\/hardware\/gg463062.aspx"},{"key":"6_CR29","unstructured":"Influenza Data, National Institutes of Health, \n                    \n                      ftp:\/\/ftp.ncbi.nlm.nih.gov\/genomes\/INFLUENZA\/influenza.faa"},{"key":"6_CR30","unstructured":"Java Data Base Connectivity, \n                    \n                      http:\/\/www.oracle.com\/technetwork\/java\/overview-141217.html"},{"key":"6_CR31","unstructured":"Java Native Interface, \n                    \n                      http:\/\/java.sun.com\/docs\/books\/jni\/"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Kementsietsidis, A., Wang, M.: On the efficiency of provenance queries. In: 25th International Conference on Data Engineering (2009)","DOI":"10.1109\/ICDE.2009.206"},{"key":"6_CR33","unstructured":"Linux Audit, \n                    \n                      http:\/\/people.redhat.com\/sgrubb\/audit\/"},{"key":"6_CR34","unstructured":"LLVM, \n                    \n                      http:\/\/llvm.org"},{"key":"6_CR35","unstructured":"lsof, \n                    \n                      ftp:\/\/lsof.itap.purdue.edu\/pub\/tools\/unix\/lsof"},{"key":"6_CR36","unstructured":"Apache Lucene, \n                    \n                      http:\/\/lucene.apache.org\/core\/old_versioned_docs\/versions\/3_0_1\/queryparsersyntax.html"},{"key":"6_CR37","unstructured":"MacFUSE, \n                    \n                      http:\/\/code.google.com\/p\/macfuse\/"},{"key":"6_CR38","unstructured":"Macko, P., Seltzer, M.: A general-purpose provenance library. In: 4th USENIX Workshop on the Theory and Practice of Provenance (2012)"},{"key":"6_CR39","series-title":"SCI","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-29931-5_4","volume-title":"Data Provenance and Data Management in eScience","author":"T. Malik","year":"2013","unstructured":"Malik, T., Gehani, A., Tariq, D., Zaffar, F.: Sketching Distributed Data Provenance. In: Liu, Q., Bai, Q., Giugni, S., Williamson, D., Taylor, J. (eds.) Data Provenance and Data Management in eScience. SCI, vol.\u00a0426, pp. 85\u2013108. Springer, Heidelberg (2013)"},{"key":"6_CR40","unstructured":"MATLAB, \n                    \n                      http:\/\/www.mathworks.com\/products\/matlab\/"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Miles, S., Deelman, E., Groth, P., Vahi, K., Mehta, G., Moreau, L.: Connecting scientific data to scientific experiments with provenance. In: 3rd IEEE International Conference on e-Science and Grid Computing (2007)","DOI":"10.1109\/E-SCIENCE.2007.22"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., Van den Bussche, J.: The Open Provenance Model core specification (v1.1). Future Generation Computer Systems (2010)","DOI":"10.1016\/j.future.2010.07.005"},{"key":"6_CR43","unstructured":"MySQL, \n                    \n                      http:\/\/www.mysql.com\/"},{"key":"6_CR44","unstructured":"Neo4j, \n                    \n                      http:\/\/neo4j.org\/"},{"key":"6_CR45","unstructured":"Novel Information Gathering and Harvesting Techniques for Intelligence in Global Autonomous Language Exploitation, \n                    \n                      http:\/\/www.speech.sri.com\/projects\/GALE\/"},{"key":"6_CR46","unstructured":"OpenBSM, \n                    \n                      http:\/\/www.trustedbsd.org\/openbsm.html"},{"key":"6_CR47","unstructured":"Open Provenance Model, \n                    \n                      http:\/\/openprovenance.org\/"},{"key":"6_CR48","unstructured":"Pancerella, C., Hewson, J., Koegler, W., Leahy, D., Lee, M., Rahn, L., Yang, C., Myers, J.D., Didier, B., McCoy, R., Schuchardt, K., Stephan, E., Windus, T., Amin, K., Bittner, S., Lansing, C., Minkoff, M., Nijsure, S., van. Laszewski, G., Pinzon, R., Ruscic, B., Wagner, A., Wang, B., Pitz, W., Ho, Y.L., Montoya, D., Xu, L., Allison, T.C., Green Jr., W.H., Frenklach, M.: Metadata in the collaboratory for multi-scale chemical science. In: Dublin Core Conference (2003)"},{"key":"6_CR49","unstructured":"Process Monitor, Windows Sysinternals, \n                    \n                      http:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb896645.aspx"},{"key":"6_CR50","doi-asserted-by":"crossref","unstructured":"Rajgarhia, A., Gehani, A.: Performance and extension of user space file systems. In: 25th ACM Symposium on Applied Computing (2010)","DOI":"10.1145\/1774088.1774130"},{"key":"6_CR51","unstructured":"Muniswamy-Reddy, K.-K., Holland, D.A., Braun, U., Seltzer, M.: Provenance-aware storage systems. In: USENIX Annual Technical Conference (2006)"},{"key":"6_CR52","unstructured":"Muniswamy-Reddy, K.-K, Braun, U., Holland, D.A., Macko, P., Maclean, D., Margo, D., Seltzer, M., Smogor, R.: Layering in provenance systems. In: USENIX Annual Technical Conference (2009)"},{"key":"6_CR53","unstructured":"Muniswamy-Reddy, K.-K., Macko, P., Seltzer, M.: Making a Cloud provenance-aware. In: 1st USENIX Workshop on the Theory and Practice of Provenance (2009)"},{"key":"6_CR54","unstructured":"Muniswamy-Reddy, K.-K., Macko, P., Seltzer, M.: Provenance for the Cloud. In: 8th USENIX Conference on File and Storage Technologies (2010)"},{"key":"6_CR55","unstructured":"Lineage File System, \n                    \n                      http:\/\/crypto.stanford.edu\/~cao\/lineage.html"},{"key":"6_CR56","unstructured":"Scalable Authentication of Grid Data Provenance, \n                    \n                      http:\/\/www.nsf.gov\/awardsearch\/showAward.do?AwardNumber=0722068"},{"key":"6_CR57","doi-asserted-by":"crossref","unstructured":"Silva, C.T., Freire, J., Callahan, S.: Provenance for visualizations: Reproducibility and beyond. Computing in Science and Engineering\u00a09(5) (2007)","DOI":"10.1109\/MCSE.2007.106"},{"key":"6_CR58","unstructured":"SLAC National Accelerator Laboratory, \n                    \n                      http:\/\/www.slac.stanford.edu\/"},{"key":"6_CR59","unstructured":"Support for Provenance Auditing in Distributed Environments, \n                    \n                      http:\/\/spade.csl.sri.com\/"},{"key":"6_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-540-39964-3_39","volume-title":"On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE","author":"M. Szomszor","year":"2003","unstructured":"Szomszor, M., Moreau, L.: Recording and Reasoning over Data Provenance in Web and Grid Services. In: Meersman, R., Schmidt, D.C. (eds.) CoopIS\/DOA\/ODBASE 2003. LNCS, vol.\u00a02888, pp. 603\u2013620. Springer, Heidelberg (2003)"},{"key":"6_CR61","unstructured":"Tariq, D., Ali, M., Gehani, A.: Towards Automated Collection of Application-Level Data Provenance. In: 4th USENIX Workshop on the Theory and Practice of Provenance (2012)"},{"key":"6_CR62","unstructured":"Tupelo project, NCSA, \n                    \n                      http:\/\/tupeloproject.ncsa.uiuc.edu\/node\/2"},{"key":"6_CR63","unstructured":"Windows Driver Kit, \n                    \n                      http:\/\/msdn.microsoft.com\/en-us\/windows\/hardware\/gg487428.aspx"},{"key":"6_CR64","unstructured":"WebDAV, \n                    \n                      http:\/\/www.webdav.org\/"},{"key":"6_CR65","unstructured":"Widom, J.: Trio: A system for integrated management of data, accuracy and lineage. In: 2nd Conference on Innovative Data Systems Research (2005)"},{"key":"6_CR66","unstructured":"Windows Management Instrumentation, http:\/\/msdn.microsoft.com\/en-us\/library\/aa394582(v=VS.85).aspx"},{"key":"6_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-30145-5_10","volume-title":"Semantics of a Networked World. Semantics for Grid Databases","author":"J. Zhao","year":"2004","unstructured":"Zhao, J., Goble, C.A., Stevens, R., Bechhofer, S.: Semantically Linking and Browsing Provenance Logs for E-science. In: Bouzeghoub, M., Goble, C.A., Kashyap, V., Spaccapietra, S. (eds.) ICSNW 2004. LNCS, vol.\u00a03226, pp. 158\u2013176. Springer, Heidelberg (2004)"},{"key":"6_CR68","doi-asserted-by":"crossref","unstructured":"Zhou, W., Sherr, M., Tao, T., Li, X., Loo, B., Mao, Y.: Efficient querying and maintenance of network provenance at Internet-scale. In: ACM SIGMOD International Conference on Management of Data (2010)","DOI":"10.1145\/1807167.1807234"}],"container-title":["Lecture Notes in Computer Science","Middleware 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35170-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T21:59:23Z","timestamp":1557352763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35170-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642351693","9783642351709"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35170-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}